Sciweavers

3089 search results - page 455 / 618
» services 2008
Sort
View
141
Voted
IJNSEC
2008
117views more  IJNSEC 2008»
15 years 3 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
122
Voted
IJSN
2008
147views more  IJSN 2008»
15 years 3 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy
142
Voted
IJVR
2008
100views more  IJVR 2008»
15 years 3 months ago
User Pluggable Animation Components in Multi-user Virtual Environment
One of the key functions to popularize 3D content services on virtual environments is on the extensibility of the underlying system. In our previous work, we had implemented an ext...
Yu-Lin Chu, Tsai-Yen Li, Cheng-Chia Chen
130
Voted
JAIR
2008
121views more  JAIR 2008»
15 years 3 months ago
A Constraint Programming Approach for Solving a Queueing Control Problem
In a facility with front room and back room operations, it is useful to switch workers between the rooms in order to cope with changing customer demand. Assuming stochastic custom...
Daria Terekhov, J. Christopher Beck
95
Voted
JCIT
2008
70views more  JCIT 2008»
15 years 3 months ago
A Local Safety Knowledge Sharing System for Proactive Management by Citizens
In this paper, we describe a local safety knowledge sharing system among the community. Our system makes it possible to share detailed safety knowledge, which includes location an...
Akira Hattori, Masato Goto, Haruo Hayami